acelerap.com

Digital Infections: Crossing Ecological Boundaries in Technology

Written on

Chapter 1: The Evolution of Computing

In the early days of my professional journey, computers operated as enigmatic "black boxes." Data was input via punched cards, with results printed on paper. Only a select few understood their inner workings, and an even smaller group, known as programmers, could modify these systems by writing the necessary instructions.

With time, technology advanced, transforming punched cards into keyboards and simple screens displaying text. Data entry became more user-friendly, yet computers remained isolated, lacking connection to the broader world or even to each other.

As technology progressed, one computer could generate data on magnetic tape for another to read. This data was still textual, formatted in a way that the receiving computer could interpret names, addresses, and account details. Initially, only corporations owned computers, as they were too expensive for individual users.

However, the landscape changed with the advent of personal computers (PCs). Individuals could now engage with their own devices and connect through modems, paving the way for online banking and direct communication between corporate systems.

Despite these advancements, many systems remained confined within isolated networks. Over the years, technological innovations have led us to the current state of connectivity:

  1. The internet has enabled nearly universal interconnectivity.
  2. Numerous systems utilize the same communication protocols.
  3. The rise of mobile phones, viewed as portable computers, has democratized access to connectivity.
  4. Commercial systems have increasingly faced data breaches and malicious hacking attempts.
  5. Even government and security systems, thought to be secure, have demonstrated vulnerabilities to hacking, indicating that many issues go unreported.
  6. The nature of circulating data has evolved from basic fax images to high-definition photos and videos.
  7. The manipulation of data makes it challenging to distinguish between genuine and altered content.
  8. Systems that once only shared data now control devices remotely or gather information to create user profiles for targeted advertising.
  9. Communication has shifted from transactional exchanges to social interaction and behavior influence.
  10. Traditional programs have been supplanted by autonomous systems capable of self-learning and decision-making.

Artificial Intelligence (AI) signifies this shift, illustrating the increasing control over devices, such as driverless cars and facial recognition technologies. While some data sharing occurs with user consent, there are numerous instances of unauthorized connections and surveillance.

The term "intelligence" carries dual meanings: it refers to both information gathering and the cognitive abilities of living beings. AI encompasses both aspects and is transitioning from mere information processing to exhibiting traits akin to living intelligence.

Chapter 2: The Challenge of Species Barriers

Why do I refer to "Jumping the Species Barrier"? The prevailing scientific consensus attributes the origin of the Covid-19 outbreak to a virus transferred from bats to humans, likely through the Wuhan market. Regardless of one's stance on this theory, my argument holds.

Human encroachment into new ecological spaces, such as deforestation, exposes us to novel species and the pathogens they harbor. These organisms can cross species barriers. For instance, the H1N1 virus responsible for the 1918 pandemic originated in birds. Notably, human diseases can also impact animal populations.

Although bacteria and viruses lack human-like intelligence, their genetic information allows them to adapt, demonstrating a basic form of collective intelligence. This enables them to reconfigure their genetic structure to exploit new hosts.

In a prior article, I explored the potential dangers posed by AI to human life. Here, I wish to broaden that discussion to encompass the implications of AI as a new species within our societal, political, and cultural ecosystems.

AI impacts various facets of our ecology, including societal control. For example, China utilizes data on societal compliance to regulate individual travel. While this may not be evident in other nations, many individuals face automated loan denials based on inaccuracies in their profiles.

AI also influences emotional and attitudinal control. Those relying on social media for political information encounter algorithmic curation of their feeds. As elections approach, one must question the potential manipulation of information, reminiscent of the Cambridge Analytica scandal.

Smart devices in our homes communicate with the internet. If not properly secured, these devices can be vulnerable to unauthorized access. Even as cybersecurity improves, they remain susceptible to control by external systems. For instance, location tracking in driverless cars poses risks of being remotely disabled.

Some may dismiss these concerns as paranoia or the result of overindulgence in dystopian fiction. However, I emphasize the need to recognize the ways AI systems permeate our daily lives, often beyond human control.

We have granted these intelligences unprecedented access to our existence, blurring the lines between passive observation and active manipulation. Governments are increasingly aware of these risks, as evidenced by their scrutiny of foreign technologies like TikTok and Huawei.

Drawing from vampire mythology, one might say that a vampire cannot enter your home unless invited. We are already opening our doors to this new form of intelligence.

How secure do you feel in this evolving landscape?

To stay updated with further writings on Relational Being and Spiral Dynamics, please follow the link below. (Note: Ctrl-Click does not work here) This will redirect you outside the Medium platform to a spam-free, GDPR-compliant environment.

The first video discusses how viruses transition from animals to humans, a crucial topic in understanding zoonotic diseases and their implications.

The second video explores zoonotic spillover and emerging viruses, shedding light on the intricate connections between species and the risks involved.

Share the page:

Twitter Facebook Reddit LinkIn

-----------------------

Recent Post:

The Healing Dance of Masculine and Feminine Energies

Explore how masculine and feminine energies can heal each other and strengthen relationships through companionship.

Spectacular Solar Storm Promises Northern Lights for New England

A powerful solar storm could illuminate the skies of New England with stunning Northern Lights this weekend.

Unlocking Your Potential: 5 Workouts to Boost Your 5K and 10K Times

Discover five creative workouts to enhance your 5km or 10km race performance while making training enjoyable.